10 Year Anniversary – FIPS 140-2 Complaint SSH Server and Client


In 2008, Georgia SoftWorks released UTS Version 7.50.0003, which allowed GSW Mobile SSH Clients a FIPS 140-2 compliant operation.

Release Notes (2008) from UTS Version 7.50.0003

FIPS 140-2 stands for Federal Information Processing Standards under Publication 140-2. It is the U.S government computer security standard used to approve cryptographic modules. FIPS certification standards are either mandated or recommended for use in federal government information technology systems. Their requirements not only cover the cryptographic modules themselves, but also their documentation and some aspects of the source code.

The story behind FIPS 140-2…

Under contract with the United States Military, GSW developed an End-to-End SSH FIPS 140-2 compliant solution (Client and Server) to meet their security requirements. This purposed and specific task was to provide a solution for the most demanding security requirements. After completing the project, Georgia SoftWorks is able to make this FIPS 140-2 compliant solution available commercially for other Federal and State agencies, as well as other private enterprises and institutions that need or desire government grade security requirements.

“It was our pleasure and honor to work with the United States Military to develop the FIPS 140-2 complaint SSH Client and Server. We were proud to develop a solution that met their strict security requirements, and are happy to offer that product to others in need of similar standards,” said Steve Lindsey of Georgia SoftWorks.

FIPS 140-2 specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive or valuable data. The FIPS 140-2 compliant option is for entities with requirements to meet cryptographic module security standards to protect sensitive and valuable data.

Why Georgia SoftWorks?

The GSW SSH Serer with FIPS140-2 compliance option provides TRUE client and TRUE server compliance, ensuring true End-to-End Security.

“Vendors that sell incomplete solutions will claim that since the device’s operating system is FIPS 140-2 compliant, that any SSH client running on it is automatically FIPS 140-2 compliant. THIS IS NOT TRUE. Please don’t be fooled! The SSH Client MUST be FIPS 140-2 compliant. If there isn’t end-to-end security, then it simply is not secure,” Lindsey said.

Learn more about the GSW UTS with Extreme Security: FIPS 140-2 Compliance.

Posted in What's Happening on Oct 25, 2018



LinkedIn Facebook Twitter